crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Forget Micro SD Cards, the Future is Molecular-Level Data Storage

Forget Micro SD Cards, the Future is Molecular-Level Data Storage

As far as leaps in computing go, this one’s pretty tiny: a research team from IBM has managed to store data on a single atom. Despite the microscopic size of the result, the impact is potentially huge when one considers the effects this discovery could have on computing.

The research team was conducting experiments concerning high-density storage, trying to see how small a medium they could record storage on. At the end of their highly complex process, it turned out that a literal bit of data could be stored on a single atom.

For reference, current drives use 100,000 atoms to store each bit.

Even more impressive, the data recorded on two atoms could be read with a mere nanometer in between the host atoms, meaning that many technologies we see today could soon become much, much smaller.

Before you get your hopes up about phones that can hold entire libraries of data, you should know that this experiment was simply that--an experiment. This single-atom tech is so sensitive, it requires the most controlled conditions in order to work. For example, the process has to be kept at a remarkably low temperature. The point was to find the smallest possible reliable memory bank, and they found it.

This is not to say, however, that atomic storage will never be seen. This research will help toward that goal significantly. So who knows, perhaps we'll see this experiment’s influence in the future--ideally sooner than later.

Consider just how drastically data storage has changed over the past few decades, where brick-sized mechanical hard disk drives went from holding a couple megabytes of data (enough for a single MP3 file), to an era where hundreds of thousands of megabytes can be stored on a Micro SD card that’s smaller than a thumbnail. Pretty cool, right?

What can the practical application of this technology present humanity? Do you think that it is the beginning of a whole new age of computing? What kinds of solutions do you expect nanotechnology to produce? Share your thoughts in the comments below.


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 24 May 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Technology Business Management Privacy Managed Service Provider Tip of the Week Internet Microsoft Saving Money Cloud Workplace Tips Business Computing Productivity Backup Best Practices IT Services Hackers Hosted Solutions IT Support Network Mobile Devices Hardware Email Malware Business Software Small Business Smartphones Data Windows Communication Server Upgrade Microsoft Office Mobile Device Management Virtualization Disaster Recovery Business Continuity VoIP Google Mobile Office Efficiency Computer Miscellaneous Vendor Management Gadgets Social Media Quick Tips Innovation WiFi Windows 10 Mobile Computing Holiday Bring Your Own Device Best Practice Passwords Spam Users Smartphone Wireless Technology User Tips BYOD Operating System Apple Content Filtering Remote Computing History Alert Remote Monitoring Internet of Things The Internet of Things Trending Going Green Information Technology Current Events Firewall Android Unified Threat Management Browser IT Solutions Save Money Lithium-ion Battery Big Data Office IT Consultant Avoiding Downtime App Hard Drives Customer Relationship Management Gmail Windows 8 Analytics Facebook Printer Tech Support Humor Managed IT services Saving Time Apps Application Network Security Virus Office Tips Retail Phishing Ransomware Maintenance Fax Server IT service Outlook Health Business Growth Marketing Customer Service Phone System Excel Computers Data Management Collaboration Budget Automation Training Social Recovery Digital Payment Artificial Intelligence VPN PowerPoint Running Cable Risk Management Co-Managed IT iPhone Employer-Employee Relationship Hacking Administration Router Inbound Marketing Password Outsourced IT Presentation Computer Repair Antivirus Business Owner Encryption Document Management Net Neutrality Hacker User IBM Programming Mobile Device Money Analyitcs Help Desk Education File Sharing Safety User Error Social Networking Hosted Solution Licensing Settings Display Tablet Wireless Data storage Chrome Managed IT Cybercrime Save Time Robot Hiring/Firing Intranet Printing End of Support Business Intelligence LiFi Website Statistics Augmented Reality Competition Piracy Network Congestion Downtime Sports Proactive IT Two-factor Authentication Search Point of Sale Virtual Desktop Mouse USB Samsung Company Culture Legal Twitter Troubleshooting Debate Experience Compliance Cybersecurity Heating/Cooling Alt Codes Touchscreen Crowdfunding Macro Consumers YouTube Regulations Mobility Typing IP Address Google Drive Bandwidth How To Gaming Console Software Tips Wearable Technology Refrigeration Cryptocurrency Disaster Google Docs Conferencing Specifications Flexibility Data Backup Cost Management Bitcoin Alerts Digital Signature PC Care Memory Value communications eBay Laptop Hacks Remote Support Leadership New Additions Skype Wi-Fi Streaming Media Documents Halloween Telephony Print Server Entrepreneur Unified Communications Text Messaging Adminstration 3D Undo Work Station PDF Congratulations People LinkedIn 5G Scary Stories Files Law Firm IT Video Surveillance Windows 8.1 Update Computing Recycling Best Available Office 365 Monitors Private Cloud Scam Deep Learning Domains Google Wallet Scheduling Fun Writing Public Cloud Bluetooth Word Online Currency Public Speaking Drones eWaste Buisness Cortana Social Engineering Sync Identities Computer Accessories Backups Environment CIO Knowledge Mobile Device Managment Solid State Drive

Top Blog

Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...

Sign Up for Our Newsletter

*First Name
*Last Name